k-times anonymous authentication (k-TAA) schemes allow members of a group to be anonymously authenticated by application providers for a bounded number of times. k-TAA has applicat...
—This paper introduces a novel contextual model for the recognition of people’s visual focus of attention (VFOA) in meetings from audio-visual perceptual cues. More specificall...
A continuing problem in business today is the design of human-computer systems that respect how work actually gets done. The overarching context of work consists of activities, wh...
William J. Clancey, Patricia Sachs, Maarten Sierhu...
—Multicasting has not been widely adopted until now, due to lack of access control over the group members. The Authentication, Authorization and Accounting (AAA) protocols are be...
Initial versions of MPI were designed to work efficiently on multi-processors which had very little job control and thus static process models. Subsequently forcing them to suppor...